Network data security sharing system based on blockchain

被引:6
作者
Lu, Xinghua [1 ]
Liu, Peihao [1 ]
Ke, Yiran [1 ]
Zhang, Hao [1 ]
机构
[1] Huali Coll Guangdong Univ Technol, Guangzhou 511325, Peoples R China
关键词
Blockchain; Network data; Secure sharing; Smart contract; Storage; Transmission management thread; SCHEME;
D O I
10.1007/s11042-021-11183-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional network data security sharing system ignores that many people share data simultaneously, which leads to poor real-time performance. Therefore, the authors designed a network data security sharing system based on blockchain technology. In the hardware design, the PCI encryption card is used to encode the data. The microprocessor is used to access the system's external equipment, and DDR-SDRAM dynamic storage area and NAND flash static memory are used as network data. In the software section of the system, a secure transmission mechanism is established. The cp-abe method is used to encrypt the network shared data, and the multi-person digital envelope technology is used to share the data. These two methods contribute to the design of the network data security sharing system. In the experiment, eight users share the data. The system login response time, key distribution time, data encryption time, and key update time are taken as the experimental objects. Experimental results show that the system response time, key distribution time, data encryption time, and key update time of the system are shorter than those of the comparison method.
引用
收藏
页码:31887 / 31906
页数:20
相关论文
共 20 条
[1]  
Abdulla A.A., 2015, Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography (Doctoral dissertation, University of Buckingham, Buckingham, United Kingdom)
[2]   Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique [J].
Al-Saleem, Saleh M. ;
Ali, Aftab ;
Khan, Naveed .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01) :469-480
[3]   Special Section on ITS Services to Smart City Context [J].
Felipe Herrera-Quintero, Luis ;
Javier Samper-Zapater, Jose ;
Svitek, Miroslav ;
David, Walid .
IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2018, 10 (02) :4-5
[4]   Design of Heterogeneous Data Integration and Sharing System for Coastal International Trade [J].
Geng, Dongfeng .
JOURNAL OF COASTAL RESEARCH, 2020, :718-721
[5]   A Blockchain-Based Framework for Lightweight Data Sharing and Energy Trading in V2G Network [J].
Hassija, Vikas ;
Chamola, Vinay ;
Garg, Sahil ;
Krishna, Dara Nanda Gopala ;
Kaddoum, Georges ;
Jayakody, Dushantha Nalin K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5799-5812
[6]   Securing ICN-Based UAV Ad Hoc Networks with Blockchain [J].
Lei, Kai ;
Zhang, Qichao ;
Lou, Junjun ;
Bai, Bo ;
Xu, Kuai .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (06) :26-32
[7]   A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment [J].
Li, Chun-Ta ;
Lee, Cheng-Chi ;
Weng, Chi-Yao .
JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01) :147-155
[8]   Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services [J].
Li, Xiaoyong ;
Ma, Huadong ;
Yao, Wenbin ;
Gui, Xiaolin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (04) :671-684
[9]   New cubic reference table based image steganography [J].
Liao, Xin ;
Guo, Sujing ;
Yin, Jiaojiao ;
Wang, Huan ;
Li, Xiong ;
Sangaiah, Arun Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) :10033-10050
[10]   Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform [J].
Liao, Xin ;
Li, Kaide ;
Yin, Jiaojiao .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) :20739-20753